Chapter3_Internet Crime

1234567891011121314151617
Across
  1. 2. is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often a virus is attached to a file, so that when the infected file is opened, the virus executes
  2. 8. Type of attacker that Promote political ideology Cyberterrorist Destroy infrastructure components of financial
  3. 9. Type of attacker thatGain financially and/or disrupt company’s information systems and business operations
  4. 11. Type of attacker that Type of attacker Cause problems, steal data, and corrupt systems
  5. 12. software generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  6. 15. is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  7. 16. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
Down
  1. 1. Type of attacker that Capture trade secrets and gain competitive advantage Cybercriminal Gain financially
  2. 3. is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  3. 4. attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  4. 5. attack is one in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  5. 6. is an attack on an information system that takes advantage of a particular system vulnerability.
  6. 7. is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  7. 10. is a harmful program that resides in the active memory of the computer and duplicates itself.
  8. 13. is a program in which malicious code is hidden inside a seemingly harmless program.
  9. 14. is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  10. 17. spam is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.